351 results on '"Storage security"'
Search Results
2. Design of cloud data storage security and financial risk control management early warning system based on sensor networks
- Author
-
Zhong Yihui
- Subjects
Sensor network ,Cloud data ,Storage security ,Financial management ,Risk control ,Early warning system ,Electric apparatus and materials. Electric circuits. Electric networks ,TK452-454.4 - Abstract
The wide application of sensor networks has brought great challenges to cloud data storage, such as transmission security, data privacy protection and financial risk control. In order to deal with these challenges, the system establishes a comprehensive management early warning system to ensure the data security and financial risk control of the sensor network. The system integrates sensor network technology and cloud data storage technology, and stores data in the cloud through the collection and transmission of environmental data by sensor nodes. In order to ensure the security of the stored process, the system adopts a series of security mechanisms, such as data encryption, access control and identity authentication, and also introduces the financial risk control module, which helps users to warn and manage financial risks through real-time monitoring and analysis of data in the sensor network. The system provides a user-friendly management interface, allowing users to easily configure and monitor the operating state of the sensor network, and supports flexible expansion and customization to adapt to the needs of different scenarios. Through the application of this system, users can effectively manage and control the security and financial risks of sensor networks in cloud data storage, and improve the efficiency and reliability of data storage management.
- Published
- 2024
- Full Text
- View/download PDF
3. Publish/Subscribe Method for Real-Time Data Processing in Massive IoT Leveraging Blockchain for Secured Storage.
- Author
-
Ataei, Mohammadhossein, Eghmazi, Ali, Shakerian, Ali, Landry Jr., Rene, and Chevrette, Guy
- Subjects
- *
REAL-time computing , *INTERNET of things , *DATA libraries , *BLOCKCHAINS , *DATA transmission systems , *BROKERS , *DATA integrity - Abstract
In the Internet of Things (IoT) era, the surge in Machine-Type Devices (MTDs) has introduced Massive IoT (MIoT), opening new horizons in the world of connected devices. However, such proliferation presents challenges, especially in storing and analyzing massive, heterogeneous data streams in real time. In order to manage Massive IoT data streams, we utilize analytical database software such as Apache Druid version 28.0.0 that excels in real-time data processing. Our approach relies on a publish/subscribe mechanism, where device-generated data are relayed to a dedicated broker, effectively functioning as a separate server. This broker enables any application to subscribe to the dataset, promoting a dynamic and responsive data ecosystem. At the core of our data transmission infrastructure lies Apache Kafka version 3.6.1, renowned for its exceptional data flow management performance. Kafka efficiently bridges the gap between MIoT sensors and brokers, enabling parallel clusters of brokers that lead to more scalability. In our pursuit of uninterrupted connectivity, we incorporate a fail-safe mechanism with two Software-Defined Radios (SDR) called Nutaq PicoLTE Release 1.5 within our model. This strategic redundancy enhances data transmission availability, safeguarding against connectivity disruptions. Furthermore, to enhance the data repository security, we utilize blockchain technology, specifically Hyperledger Fabric, known for its high-performance attributes, ensuring data integrity, immutability, and security. Our latency results demonstrate that our platform effectively reduces latency for 100,000 devices, qualifying as an MIoT, to less than 25 milliseconds. Furthermore, our findings on blockchain performance underscore our model as a secure platform, achieving over 800 Transactions Per Second in a dataset comprising 14,000 transactions, thereby demonstrating its high efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Cloud Computing Security.
- Author
-
Totade, S. K., Bhumbar, Priyanka, Samudre, Vaishnavi, and Darsimbe, Lalita
- Subjects
CLOUD computing ,VIRTUAL machine systems ,MACHINE learning ,DEEP learning ,ARTIFICIAL neural networks ,ARTIFICIAL intelligence - Abstract
Cloud computing refers to the management of data and servers and the provision of technology services using cloud computing technology. It is commonly used to store large amounts of data on cloud platforms. As a result, it is essential to safeguard data in various formats such as text, audio, video, and others. This paper presents a research study on cloud security, focusing on AWS, the most trusted cloud computing provider. AWS offers not only cloud security but also cloud storage services. The document addresses several key security challenges, including virtualization security, data storage in the cloud, and risk tolerance assessment in cloud computing. As the cloud grows, it is increasingly important to understand and implement effective security measures to protect sensitive information and maintain trust in cloud-based services. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Literature Survey on Empirical Analysis on Efficient Secured Data Communication in Cloudcomputing Environment
- Author
-
Shakira, P. V., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Jeena Jacob, I., editor, Kolandapalayam Shanmugam, Selvanayaki, editor, and Izonin, Ivan, editor
- Published
- 2023
- Full Text
- View/download PDF
6. Embedded Devices Security: Design and Implementation of a Light RDBMS Encryption Utilizing Multi-Core Processors
- Author
-
Mohammad Ahmed Alomari, Hazleen Aris, Mukhtar Ghaleb, Yahya Almurtadha, Gamal Abdulnaser Alkawsi, Ismail Ahmad Al-Qasem Al-Hadi, Yahia Baashar, and Khairulmizam Samsudin
- Subjects
Storage security ,embedded devices ,SQLite RDBMS ,performance evaluation ,mobile devices ,multi-core processors ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The pervasive proliferation of embedded, mobile, and IoT devices continue to change our lifestyle dramatically. However, the huge increase in these devices has come with critical breaches to data resting inside them. Many types of such data are considered to be sensitive and confidential. Because the most sensitive data of such devices are resting in databases, focusing on encrypting SQLite databases will be more efficient than full disk encryption (FDE). While SQLite is a very popular, lightweight, and easy-to-use relational database suitable for embedded and mobile devices, its stored data suffers serious security risks. If an attacker can gain access to higher system privileges or find a way to access the database plain file, he can tamper with the database files and user-sensitive data, which breaches the security CIA triad of SQLite. To ensure data confidentiality in SQLite databases of embedded devices, we present a design and implementation of a parallel database encryption system, called SQLite-XTS. The developed system encrypts the database pages on- the-fly in a transparent manner without user intervention. Because performance is a critical issue, SQLite-XTS utilizes multi-core processors coming with most current mobile and embedded devices. The developed parallel SQLite-XTS was successfully implemented and integrated into a testbed device. To assess the performance and feasibility of this system, it was compared to three other SQLite implementations: plain SQLite, serial XTS SQLite, and SQLCipher-CBC. The results show that SQLite-XTS reduces the overhead of database encryption from 30.8% with serial implementation to 17.8% when SQLite-XTS is used. This provides the developed system with an efficiency of 73% compared with its serial counterpart. The results clarify that SQLite-XTS introduces significant performance improvements compared to other implementations. Experiments also show that the system has a very low impact on the memory of these resource-limited devices.
- Published
- 2023
- Full Text
- View/download PDF
7. Data Migration and Storage Security of University Library
- Author
-
Zhang, Jinbai, Xing, Liang, Chen, Youchen, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Hung, Jason C., editor, Chang, Jia-Wei, editor, Pei, Yan, editor, and Wu, Wei-Chen, editor
- Published
- 2022
- Full Text
- View/download PDF
8. Tele-Health Security Framework for Medical Image Storage.
- Author
-
Saad, Mohammed Ayad, Rashid, Ahmed Hashim, Jaafar, Rosmina, and Chellappan, Kalaivani
- Subjects
TELEMEDICINE ,COVID-19 pandemic ,INTERNET of things ,DATA security ,CLOUD computing - Abstract
Since the emergence of COVID-19, awareness on telehealth and related discussions have escalated because of the increasing demand for online applications and services to minimize in-person meetings and treatments. After decades of using telehealth services in only a few situations, nowadays such services have gained prevalence. Besides the increasing need for these services, the highly developed telecommunication networks and the use of the Internet -of things have enhanced the use of such services. One of the technologies used in telehealth services is medical imaging, where images store important information for later usage. However, medical image storage has several problems associated with it, including latency, image size, and security. The first two issues can be overcome using a cloud storage environment, but security challenges are on a rise with the introduction of cloud storage and telehealth services. In this review paper, we investigate the requirement of medical image management that should be taken into consideration in designing a security framework for telehealth services. A framework is devised for the storage security management techniques using two different parameters: device security and access security. Furthermore, we discuss some related works that propose advanced techniques to ensure medical image security. [ABSTRACT FROM AUTHOR]
- Published
- 2022
9. A Strong Combination of Cryptographic Techniques to Secure Cloud-Hosted Data.
- Author
-
Altarawneh, Khalid
- Subjects
DATA security ,PUBLIC key cryptography ,CLOUD computing security measures ,HYBRID systems ,DATA encryption ,HYBRID securities - Abstract
In Hybrid Cloud Security, we combine symmetric encryption with key management to ensure anonymity. Our method provides a flexible and scalable deployment solution for cloud-based data security. To store, analyse, and deal with data, cloud computing relies on a core concept: sharing resources. Since cloud services are utilized by many individuals and are dispersed across the Internet, they provide a number of security vulnerabilities. Due to their worldwide accessibility, hybrid clouds open up a wide range of opportunities. The security solution works with a wide variety of PaaS, SaaS, and even IaaS cloud services (Infrastructure as a Service). It also works with most Cloud services out there. Hybrid public key cryptosystems can improve cloud security. Businesses are wary about cloud computing due to security concerns. The primary goal of this research is to strengthen the security of cloud computing by fusing the cryptographic models of Rabin and Rivest-Shamir-Adleman (RSA). Evaluating the efficacy of a hybrid approach to producing secret keys for data encryption and decryption. The purely RSA-based system has higher latency and is less computationally intensive than the hybrid system. [ABSTRACT FROM AUTHOR]
- Published
- 2023
10. A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data Storage.
- Author
-
Sohal, Manreet, Bharany, Salil, Sharma, Sandeep, Maashi, Mashael S., and Aljebreen, Mohammed
- Abstract
Information storage and access in multi-cloud environments have become quite prevalent. In this paper, a multi-cloud framework is presented that secures users' data. The primary goal of this framework is to secure users' data from untrusted Cloud Service Providers (CSPs). They can collude with other malicious users and can hand over users' data to these malicious users for their beneficial interests. In order to achieve this goal, the data are split into parts, and then each part is encrypted and uploaded to a different cloud. Therefore, client-side cryptography is used in this framework. For encrypting users' data, the BDNA encryption technique is used. This framework presents a hybrid cryptographic approach that uses Identity-based Broadcast Encryption (IBBE) for managing the keys of the symmetric key algorithm (BDNA) by encrypting them with the particular version of IBBE. The work presented in this research paper is the first practical implementation of IBBE for securing encryption keys. Earlier, IBBE was only used for securely broadcasting data across many users over a network. The security of this hybrid scheme was proved through Indistinguishable Chosen-Ciphertext Attacks. This double encryption process makes the framework secure against all insiders and malicious users' attacks. The proposed framework was implemented as a web application, and real-time storage clouds were used for storing the data. The workflow of the proposed framework is presented through screenshots of different working modules. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Framework Towards Higher Data Privacy by Novel Data Integrity Scheme
- Author
-
Anil Kumar, G., Shantala, C. P., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Mallick, Pradeep Kumar, editor, Bhoi, Akash Kumar, editor, Marques, Gonçalo, editor, and Hugo C. de Albuquerque, Victor, editor
- Published
- 2021
- Full Text
- View/download PDF
12. Effects of different mineral reaction kinetics equations on predicting long‐term CO2 mineral sequestration.
- Author
-
Li, Heng, Wang, Fugang, Pan, Huilin, Wu, Mingjie, Wang, Yaohui, Tian, Hailong, Yuan, Yilong, and Yang, Zhijie
- Subjects
- *
GEOLOGICAL carbon sequestration , *CHEMICAL kinetics , *CARBON sequestration , *PRECIPITATION (Chemistry) , *EMISSIONS (Air pollution) , *MINERALS - Abstract
Summary: CO2 geological storage (CGS) is one of the important means to effectively reduce greenhouse gas emissions. Mineral trapping is an important factor affecting long‐term storage security. The process of mineral trapping is significantly affected by mineral reaction kinetics. Therefore, it is of great significance to clarify the influence trend and degree of the control equation of mineral reaction kinetics on predicting the process of CO2 storage and the amount of mineral sequestration. In this paper, the effect of different reaction rate equations on predicting long‐term CO2 sequestration mechanisms are compared and analyzed by numerical simulation using the existing reaction rate equations. The results show that different reaction rate equations of related minerals have no significant effect on predicting the total amount of CO2 sequestration and the transformation relationship among different minerals, but will significantly affect different forms of CO2 sequestration, especially mineral trapping. The ratio of mineral trapping predicted by different reaction rate equations is 20% to 41%. And the predicted CO2 mineral trapping rate is twice as high when the linear rate equation is used as when the nonlinear rate equation is used. In previous studies, linear rate equations have been widely used to describe the dissolution/precipitation reactions of related minerals, which may greatly overestimate the reaction rate and theoretical capture capacity of minerals. Therefore, it is urgent to carry out reaction kinetics experiments and numerical simulation studies on various major minerals under the condition of CO2 geological storage in the future, to obtain a more accurate mineral dissolution/precipitation reaction rate equation and improve the ability to evaluate the long‐term CO2 geological sequestration safety. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense.
- Author
-
Min, Donghyun, Ko, Yungwoo, Walker, Ryan, Lee, Junghee, and Kim, Youngjae
- Subjects
- *
SOLID state drives , *RANSOMWARE , *AMOEBA - Abstract
Ransomware is a growing concern in business and government because it causes immediate financial damages or loss of important data. There is a way to detect and block ransomware in advance, but evolved ransomware can still attack while avoiding detection. Another alternative is to back up the original data. However, existing backup solutions can be under the control of ransomware and backup copies can be destroyed by ransomware. Moreover, backup methods incur storage and performance overhead. In this article, we propose AMOEBA, a device-level backup solution that does not require additional storage for backup. AMOEBA is armed with: 1) a hardware accelerator to run content-based detection algorithms for ransomware detection at high speed and 2) a fine-grained backup control mechanism to minimize space overhead for data backup. For evaluations, we not only implemented AMOEBA using the Microsoft solid-state drive (SSD) simulator but also prototyped it on the OpenSSD-platform. Our extensive evaluations with real ransomware workloads show that AMOEBA has high ransomware detection accuracy with negligible performance overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
- Author
-
Heqing Song, Jifei Li, and Haoteng Li
- Subjects
Cloud computing ,data dispersion ,data encryption ,key management ,storage security ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Cloud storage service has shown its great power and wide popularity which provides fundamental support for rapid development of cloud computing. However, due to management negligence and malicious attack, there still lie enormous security incidents that lead to quantities of sensitive data leakage at cloud storage layer. From the perspective of protecting cloud data confidentiality, this paper proposed a Cloud Secure Storage Mechanism named CSSM. To avoid data breach at the storage layer, CSSM integrated data dispersion and distributed storage to realize encrypted, chucked and distributed storage. In addition, CSSM adopted a hierarchical management approach and combined user password with secret sharing to prevent cryptographic materials leakage. The experimental results indicate that proposed mechanism is not only suitable for ensuring the data security at storage layer from leakage, but also can store huge amount of cloud data effectively without imposing too much time overhead. For example, when users upload/download 5G sized file with CSSM, it only takes 646seconds/269seconds, which is acceptable for users.
- Published
- 2021
- Full Text
- View/download PDF
15. Quantitative analysis of the numerical simulation uncertainties from geological models in CO2 geological storage: A case study of Shenhua CCS project.
- Author
-
Shi, Huanwei, Li, Jun, Shen, Haolong, Li, Xiaochun, Wei, Ning, Wang, Yongsheng, Wang, Yan, and Pan, Huanquan
- Subjects
GEOLOGICAL carbon sequestration ,GEOLOGICAL modeling ,CARBON sequestration ,NUMERICAL analysis ,QUANTITATIVE research ,COMPUTER simulation ,ATMOSPHERIC carbon dioxide - Abstract
• Classification and analysis of geological heterogeneous factors for accurate simulations. • Quantification assessment of CO 2 storage parameters using two sensitivity methods. • Various heterogeneous factors exert distinct influences on CO 2 plume and BHP in different layers and time. • A method to enhance CO 2 storage modeling precision with limited data. The intensifying global climate change has prompted the imperative implementation of CO 2 capture and storage (CCS) projects as a mitigation strategy. Ensuring the safety and reliability of these projects requires meticulous validation, including the establishment of geological models and conducting numerical simulations. In CO 2 geological storage initiatives, the limitation of well data during the initial stages leads to data deficiency. This scarcity compromises the precision of geological and numerical models, hindering their ability to accurately depict actual subsurface conditions. Meanwhile, parameters related to heterogeneity significantly also impact storage effectiveness and safety. This study addresses these challenges by utilizing the Shenhua CCS demonstration project as a case study. Various heterogeneous parameters are selected, and local and global sensitivity analysis methods are subsequently introduced to determine the ranges and sequences of these parameters in numerical simulations. The simulation results can aid in assessing the influence of various heterogeneous parameters on the CO 2 plume and bottom hole pressure. The study establishes the importance ranking of various heterogeneous parameters under different temporal and spatial conditions through sensitivity analysis. The findings reveal the following key points: 1. During the small-scale injection period, the CO 2 plume is particularly sensitive to variations in net-to-gross and vertical permeable properties. 2. During and after larger-scale injections, the net-to-gross significantly impacts plume evolution, while bottom hole pressure is predominantly influenced by variations in vertical permeable properties. 3. Both the CO 2 plume and well bottom pressure are primarily affected by changes in sand body morphologies, especially at low net-to-gross scenarios. These conclusions assist in prioritizing the collection of critical parameter data in CCS projects, facilitating the establishment of more precise and reliable geological and numerical simulation models. The heightened accuracy and reliability of these models contribute to improving their predictive capabilities, ultimately guiding engineering practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Authenticated LSM Trees with Minimal Trust
- Author
-
Tang, Yuzhe, Li, Kai, Chen, Ju, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Chen, Songqing, editor, Choo, Kim-Kwang Raymond, editor, Fu, Xinwen, editor, Lou, Wenjing, editor, and Mohaisen, Aziz, editor
- Published
- 2019
- Full Text
- View/download PDF
17. Application of intelligent optimization technology in CO2 geological storage and utilization.
- Author
-
HOU Zhiwei
- Abstract
Combining the practical engineering problems of CO
2 geological storage and utilization with intelligent optimization technology can maximize CO2 utilization rate, oil and gas reservoir recovery and economic benefits. The suitable storage sites for CO2 geological storage, the potential of CO2 geological storage for oil and gas reservoirs and the main storage projects are introduced. The research status of intelligent optimization technology in joint optimization of recovery and storage stock is reviewed. The advantages and disadvantages of different intelligent optimization technologies are compared. Combined with the application of well location optimization, injection and production optimization and surrogate model optimization technology in mitigating leakage risk, the intelligent optimization technology suitable for CO2 geological storage and utilization is obtained, and the future development trends are put forward. [ABSTRACT FROM AUTHOR]- Published
- 2021
18. Storage Security
- Author
-
Voruganti, Kaladhar, Liu, Ling, editor, and Özsu, M. Tamer, editor
- Published
- 2018
- Full Text
- View/download PDF
19. Efficient ORAM Based on Binary Tree without Data Overflow and Evictions
- Author
-
Li, Shufeng, Zhao, Minghao, Jiang, Han, Xu, Qiuliang, Wei, Xiaochao, Diniz Junqueira Barbosa, Simone, Series editor, Chen, Phoebe, Series editor, Du, Xiaoyong, Series editor, Filipe, Joaquim, Series editor, Kara, Orhun, Series editor, Liu, Ting, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Li, Kangshun, editor, Li, Jin, editor, Liu, Yong, editor, and Castiglione, Aniello, editor
- Published
- 2016
- Full Text
- View/download PDF
20. Security of Cloud-Based Storage
- Author
-
Saharan, Shweta, Somani, Gaurav, Sammes, A.J., Series editor, Zhu, Shao Ying, editor, Hill, Richard, editor, and Trovati, Marcello, editor
- Published
- 2015
- Full Text
- View/download PDF
21. Privacy-Preserving Multidimensional Range Query on Real-Time Data
- Author
-
Ting, Zhong, Xiao, Han, Yunshuo, Yang, Aixiang, Zhu, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Huang, Zhiqiu, editor, Sun, Xingming, editor, Luo, Junzhou, editor, and Wang, Jian, editor
- Published
- 2015
- Full Text
- View/download PDF
22. Enhanced Trusted Third Party for Cyber Security in Multi Cloud Storage
- Author
-
Sammeta, Naresh, Jagadeesh Kannan, R., Parthiban, Latha, Kacprzyk, Janusz, Series editor, Satapathy, Suresh Chandra, editor, Avadhani, P. S., editor, Udgata, Siba K., editor, and Lakshminarayana, Sadasivuni, editor
- Published
- 2014
- Full Text
- View/download PDF
23. TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing
- Author
-
Jiang, Tao, Chen, Xiaofeng, Li, Jin, Wong, Duncan S., Ma, Jianfeng, Liu, Joseph, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Huang, Xinyi, editor, and Zhou, Jianying, editor
- Published
- 2014
- Full Text
- View/download PDF
24. Impact of formation slope and fault on CO2 storage efficiency and containment at the Shenhua CO2 geological storage site in the Ordos Basin, China.
- Author
-
Jing, Jing, Tang, Zhonghua, Yang, Yanlin, and Ma, Liangzhe
- Subjects
FAULT zones ,FINITE differences ,STORAGE ,CARBON dioxide ,CONCEPTUAL models ,GEOLOGIC faults - Abstract
• A suite of 3D models with faulting and variable reservoir dip were built based on the Shenhua CCS demonstration site. • Plume migration and volumetric storage were found to be a function of reservoir dip and high transmissibility fault zone. • The results will help to inform site selection for future CCS projects in the Ordos Basin and other potential storage sites. Carbon dioxide (CO 2) storage security is a key issue in CO 2 geological storage (CGS). A three-dimensional (3D) conceptual reservoir model of the Shenhua CO 2 geological storage site in the Ordos Basin has been used to investigate the impact of reservoir formation dip and the influence of enhanced permeability fault zones on CO 2 storage and migration security. A total of 8 simulations were carried out using the TOUGH2 integral finite difference modelling code with the ECO2N fluid property module. The simulation results showed that the dip of the reservoir formation and fault had a significant impact on CO 2 migration and storage security. Increasing the dip of the reservoir increased CO 2 migration distance, decreased the total volume of CO 2 safely stored in the formation and resulted in increased maximum gas saturation and liquid mass fraction of dissolved CO 2. The presence of fault provided a channel for CO 2 leakage and caused an irregular distribution of formation pressure. The onset time of leakage through the fault proved to be a function of formation dip, occurring at 465, 230, and 160 years following commencement of CO 2 injection for dips of 5°, 10°, and 15° respectively. The lateral extent of both the high saturation CO 2 plume and the plume of dissolved CO 2 was greater in the steeply dipping faulted reservoir model, suggesting that gently dipping un-faulted reservoir formations should be selected for future CGS projects in the Ordos Basin. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications.
- Author
-
Yi, Haibo and Nie, Zhe
- Subjects
- *
APPLICATION-specific integrated circuits , *INTERNET of things , *DATA warehousing , *PUBLIC key cryptography , *CYBERTERRORISM - Abstract
Secure storage devices are a good example of the Internet of Things (IoTs), which require secure access control mechanisms via using the prominent pubic key cryptographic systems, e.g. RSA, ECC and related systems. However, quantum computer is in a position to attack RSA, ECC and other signature algorithms adopted by many storage devices. Therefore, storage security is facing severe threats. In this paper, an efficient hardware architecture based on multivariate scheme for storage devices is proposed. Multivariate scheme belongs to multivariate public key cryptography (MPKC), which uses affine transformations and central map transformations during cryptographic operations. The advantage of adopting multivariate scheme is that multivariate scheme is immune to quantum computer attack. The efficient hardware architecture is composed of processor module, cryptographic module, storage module, display module, power module, keyboard module, export module and terminal module (off-chip). We implement the hardware architecture on the methodology of TSMC-0.18 μm standard cell CMOS Application Specific Integrated Circuit. The implementation results show that the architecture based on multivariate scheme is very efficient and well suit for storage devices. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
26. An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
- Author
-
Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, and Tie Qiu
- Subjects
Cloud computing ,storage security ,provable data possession ,bidirectional authentication ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.
- Published
- 2016
- Full Text
- View/download PDF
27. Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication
- Author
-
Bin Zhang, Yuning Zheng, Sheng Hong, Yuejiao Zhang, and Jun Wang
- Subjects
Authentication ,Public key certificate ,General Computer Science ,business.industry ,Computer science ,Distributed data store ,Storage security ,Computer data storage ,Big data ,Information system ,business ,Data transmission ,Computer network - Abstract
With the continuous development of information technology, the amount of data in information systems continues to increase. Big data has become an inevitable trend in the development of information technology, and the problems faced by the secure storage of big data have also become problems that must be solved. On the one hand, the research in this paper meets the storage requirements of unstructured massive data. On the other hand, it applies digital certificate authentication technology to realize storage security identity authentication based on digital certificate, and solves the application problem of high-security identity authentication in distributed storage. The innovation of this paper is to use the corresponding virtual storage space mapping algorithm to realize the unified management of resource pool. And before data transmission, the digital certificate authentication method is used to realize the authority control of the storage resource pool. This paper has completed the design and implementation of the distributed secure storage system, and completed the related testing and verification work, which significantly improved the performance of data storage and solved the problem of big data secure storage.
- Published
- 2021
28. A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data Storage
- Author
-
Manreet Sohal, Salil Bharany, Sandeep Sharma, Mashael S. Maashi, and Mohammed Aljebreen
- Subjects
multi-clouds ,storage security ,client-side cryptography ,key management ,Renewable Energy, Sustainability and the Environment ,Geography, Planning and Development ,Building and Construction ,Management, Monitoring, Policy and Law - Abstract
Information storage and access in multi-cloud environments have become quite prevalent. In this paper, a multi-cloud framework is presented that secures users’ data. The primary goal of this framework is to secure users’ data from untrusted Cloud Service Providers (CSPs). They can collude with other malicious users and can hand over users’ data to these malicious users for their beneficial interests. In order to achieve this goal, the data are split into parts, and then each part is encrypted and uploaded to a different cloud. Therefore, client-side cryptography is used in this framework. For encrypting users’ data, the BDNA encryption technique is used. This framework presents a hybrid cryptographic approach that uses Identity-based Broadcast Encryption (IBBE) for managing the keys of the symmetric key algorithm (BDNA) by encrypting them with the particular version of IBBE. The work presented in this research paper is the first practical implementation of IBBE for securing encryption keys. Earlier, IBBE was only used for securely broadcasting data across many users over a network. The security of this hybrid scheme was proved through Indistinguishable Chosen-Ciphertext Attacks. This double encryption process makes the framework secure against all insiders and malicious users’ attacks. The proposed framework was implemented as a web application, and real-time storage clouds were used for storing the data. The workflow of the proposed framework is presented through screenshots of different working modules.
- Published
- 2022
- Full Text
- View/download PDF
29. An Integrity Verification Scheme for Multiple Replicas in Clouds
- Author
-
Zhang, La, Li, Qingzhong, Shi, Yuliang, Li, Lin, He, Wenxiao, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Wang, Fu Lee, editor, Lei, Jingsheng, editor, Gong, Zhiguo, editor, and Luo, Xiangfeng, editor
- Published
- 2012
- Full Text
- View/download PDF
30. Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data
- Author
-
Walker, Ieuan, Hewage, Chaminda, and Jayal, Ambikesh
- Published
- 2022
- Full Text
- View/download PDF
31. Disk encryption: do we need to preserve length?
- Author
-
Chakraborty, Debrup, López, Cuauhtemoc Mancillas, and Sarkar, Palash
- Abstract
In the last one and a half decade there has been a lot of activity toward development of cryptographic techniques for disk encryption. It has been almost canonized that an encryption scheme suitable for the application of disk encryption must be length preserving, i.e., it rules out the use of schemes such as authenticated encryption where an authentication tag is also produced as a part of the ciphertext resulting in ciphertexts being longer than the corresponding plaintexts. The notion of a tweakable enciphering scheme (TES) has been formalized as the appropriate primitive for disk encryption, and it has been argued that they provide the maximum security possible for a tagless scheme. On the other hand, TESs are less efficient than some existing authenticated encryption schemes. Also TES cannot provide true authentication as they do not have authentication tags. In this paper, we analyze the possibility of the use of encryption schemes where length expansion is produced for the purpose of disk encryption. On the negative side, we argue that nonce-based authenticated encryption schemes are not appropriate for this application. On the positive side, we demonstrate that deterministic authenticated encryption (DAE) schemes may have more advantages than disadvantages compared to a TES when used for disk encryption. Finally, we propose a new deterministic authenticated encryption scheme called BCTR which is suitable for this purpose. We provide the full specification of BCTR, prove its security and also report an efficient implementation in reconfigurable hardware. Our experiments suggests that BCTR performs significantly better than existing TESs and existing DAE schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. CO2 sequestration with limited sealing capability: A new injection and storage strategy in the Pearl River Mouth Basin (China).
- Author
-
Heinemann, Niklas, Haszeldine, R. Stuart, Shu, Yutong, Stewart, R. Jamie, Scott, Vivian, and Wilkinson, Mark
- Subjects
CARBON sequestration ,GEOLOGICAL time scales ,CARBON dioxide injection ,CLIMATE change mitigation - Abstract
Storing CO 2 for geological timescales is crucial to delivering decarbonisation of industrial economies aligned with global climate change mitigation objectives. This requires CO 2 injection into a large subsurface pore space overlain by a high capillary entry pressure seal rock to prevent CO 2 escape. Such formations occur abundantly in productive hydrocarbon basins such as the North Sea. However, these geological conditions for CO 2 storage are unavailable close to some large CO 2 emitting economic areas in China. We identify this problem and innovate a solution for the example of the Pearl River Mouth Basin (China). This offshore basin has an estimated effective storage capacity of hundreds of Gt CO 2 based on reservoir pore volumes. Production and geological data of three oil fields of the Huizhou hydrocarbon cluster are analysed as analogues for large-scale aquifer storage of CO 2 . Results suggest the injection and storage of CO 2 in individual trap structures will perform poorly, due to thin reservoir layers, small structural traps, and indications that the cap rocks may have only limited sealing capability. To address this a novel alternative CO 2 sequestration strategy, based on multi reservoir layer injection and dispersion trapping, is recommended to exploit the vast available pore space for CO 2 storage. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
33. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
- Author
-
Wang, Qian, Wang, Cong, Li, Jin, Ren, Kui, Lou, Wenjing, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Backes, Michael, editor, and Ning, Peng, editor
- Published
- 2009
- Full Text
- View/download PDF
34. Integrity Protection for Revision Control
- Author
-
Cachin, Christian, Geisler, Martin, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Abdalla, Michel, editor, Pointcheval, David, editor, Fouque, Pierre-Alain, editor, and Vergnaud, Damien, editor
- Published
- 2009
- Full Text
- View/download PDF
35. Composite confining systems: Rethinking geologic seals for permanent CO2 sequestration.
- Author
-
Bump, Alexander P., Bakhshian, Sahar, Ni, Hailun, Hovorka, Susan D., Olariu, Marianna I., Dunlap, Dallas, Hosseini, Seyyed A., and Meckel, Timothy A.
- Subjects
CARBON sequestration ,GEOLOGICAL carbon sequestration ,PETROLEUM reservoirs ,CARBON dioxide ,MUDSTONE ,MIOCENE Epoch - Abstract
• Composite confining systems are multi-layer systems of discontinuous barriers. • They work by drastically lowering effective Kv/Kh, creating long flow paths for CO 2. • Migration-assisted trapping effectively immobilizes CO 2 with little vertical migration. • Risks are familiar—legacy wells, permeable faults and high-relief structures. • Composite confining systems are ideally suited to the goal of permanent sequestration. Permanent containment is paramount for geologic carbon sequestration. Petroleum experience proves the possibility but also creates bias—to date, carbon storage projects have used seals similar to those of producing petroleum accumulations—thick, laterally extensive, effectively impermeable layers. These work for CO 2 , but may not be present where needed, nor optimal for sequestration. We introduce the concept of composite confining systems, defined here as multi-layer stratigraphic systems of discontinuous barriers with no a priori requirements for continuity or minimum capillary entry pressure. We explore the concept through physical analog modeling, geologic characterization and full-scale numerical modeling. We find that barriers need only offer enough capillary entry pressure contrast to divert the flow of CO 2 and that barrier frequency and barrier area are the key variables in retarding vertical migration. Data from Southern Louisiana Miocene deltaic deposits shows ∼5–15 mudstone barriers/100 m of section, with average mudstone lengths of over 1 km and aspect ratios ∼2:1, giving effective ratios of vertical to horizontal permeability (k v /k h) of ∼0.0005. Full-scale reservoir models show that these systems can completely arrest vertical migration of industrial-scale volumes of CO 2 (10's of megatons) within a few 10's of meters of stratigraphic section. Unlike more conventional petroleum seals and traps, which retain CO 2 in a concentrated, mobile state, composite confining systems disperse and immobilize it via migration-assisted trapping. The greatest risks to performance of composite confining systems are the same as for conventional seals–the potential shortcuts across stratigraphic barriers, e.g., legacy wells, fluid escape pipes and permeable faults that focus flow. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. The Security Threats and Corresponding Measures to Distributed Storage Systems
- Author
-
Chen, Lanxiang, Feng, Dan, Ming, Liang, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Xu, Ming, editor, Zhan, Yinwei, editor, Cao, Jiannong, editor, and Liu, Yijun, editor
- Published
- 2007
- Full Text
- View/download PDF
37. An Implementation and Evaluation of Online Disk Encryption for Windows Systems
- Author
-
Singh, Vartika, Lakshminarasimhaiah, D. R., Mishra, Yogesh, Viswanathan, Chitra, Athithan, G., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Bagchi, Aditya, editor, and Atluri, Vijayalakshmi, editor
- Published
- 2006
- Full Text
- View/download PDF
38. Multi-Instance Deep Learning Based on Attention Mechanism for Failure Prediction of Unlabeled Hard Disk Drives
- Author
-
Guochao Wang, Yu Wang, and Xiaojie Sun
- Subjects
Artificial neural network ,Computer science ,business.industry ,Deep learning ,Reliability (computer networking) ,020208 electrical & electronic engineering ,Feature extraction ,Data classification ,02 engineering and technology ,computer.software_genre ,Data modeling ,Storage security ,0202 electrical engineering, electronic engineering, information engineering ,Data center ,Artificial intelligence ,Data mining ,Electrical and Electronic Engineering ,business ,Instrumentation ,computer - Abstract
Failure of hard disk drives (HDDs) is the most critical reliability issue of data center. Therefore, predicting the failure of the HDD is an important means to ensure the storage security of the data center. However, most current research works had not paid attention to the fact that the self-monitoring, analysis and reporting technology (SMART) data in a returned failed HDD are a long-term sequence that consists of many unlabeled data, as the healthy and faulty data are highly mixed. Because the failure data in the rapid degradation period are less than the health data in the normal state, the mixture of healthy and faulty data results in an extremely data imbalance. This brings a great challenge to find the hidden fault information, and thus failure prediction becomes a difficult task. To cope with the above problems, a multi-instance long-term data classification method based on long short-term memory (LSTM) network and attention mechanism are proposed to predict the failure of HDDs. Regarding long time sequence HDD data as an instance bag, multi-instance learning (MIL) divides it into multiple instances in the subconcept layer, and then studies the connection between instances and bag labels. Based on the analysis of HDD data of a communication company and Backblaze data center, our proposed method can obtain much better results than other methods.
- Published
- 2021
39. A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
- Author
-
Jifei Li, Heqing Song, and Haoteng Li
- Subjects
General Computer Science ,Computer science ,Data security ,Cloud computing ,02 engineering and technology ,Encryption ,Secret sharing ,Upload ,Distributed data store ,0202 electrical engineering, electronic engineering, information engineering ,key management ,General Materials Science ,data encryption ,Password ,business.industry ,General Engineering ,020206 networking & telecommunications ,TK1-9971 ,storage security ,020201 artificial intelligence & image processing ,Electrical engineering. Electronics. Nuclear engineering ,business ,Cloud storage ,data dispersion ,Computer network - Abstract
Cloud storage service has shown its great power and wide popularity which provides fundamental support for rapid development of cloud computing. However, due to management negligence and malicious attack, there still lie enormous security incidents that lead to quantities of sensitive data leakage at cloud storage layer. From the perspective of protecting cloud data confidentiality, this paper proposed a Cloud Secure Storage Mechanism named CSSM. To avoid data breach at the storage layer, CSSM integrated data dispersion and distributed storage to realize encrypted, chucked and distributed storage. In addition, CSSM adopted a hierarchical management approach and combined user password with secret sharing to prevent cryptographic materials leakage. The experimental results indicate that proposed mechanism is not only suitable for ensuring the data security at storage layer from leakage, but also can store huge amount of cloud data effectively without imposing too much time overhead. For example, when users upload/download 5G sized file with CSSM, it only takes 646seconds/269seconds, which is acceptable for users.
- Published
- 2021
40. Investigation of Caprock Integrity Due to Pressure Build-up During High-volume Injection into the Utsira Formation.
- Author
-
Gasda, Sarah E., Wangen, Magnus, Bjørnarå, Tore I., and Elenius, Maria T.
- Abstract
In this work, we investigate the pressure-limited storage capacity of the Utsira formation. We employ the use of a simple capacity estimate based on maximum sustainable pressure. Here, the pressure during injection or post-injection cannot exceed the least compressive stress at the base of the caprock at any location. Given the global capacity estimate, large-scale simulations are performed to determine if the global capacity can be reasonably attained given local injectivity constraints and long-term CO 2 trapping. We find that the Utsira can withstand injection rates over 100 Mt/y for 50 years, which is equivalent to 8.3 Gt of CO 2 . [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
41. Efficient Android-based storage encryption using multi-core CPUs.
- Author
-
Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman, and Hashim, Shaiful J.
- Subjects
DATA encryption ,INFORMATION technology security ,MULTICORE processors ,CENTRAL processing units ,SMARTPHONES - Abstract
The huge proliferation of mobile and handheld devices, such as tablets and Smartphone devices, has come with different threats to the sensitive data and personally identifiable information stored inside these devices. The most efficient way to ensure data protection is through encryption; however, it comes with great impact on these small gadgets, which suffer from limited resources. Majority of recent mobile devices are equipped with increasingly powerful multi-core processors that researchers can leverage in order to enhance data protection while maintaining proper device performance. In this paper, we introduce a parallel implementation for data encryption inside the storage of Android-based mobile devices. This work implements a multi-core design of different encryption ciphers, making use of the commodity multi-core CPUs available currently in new smart gadget devices, in order to enhance the performance inside these resource-limited devices. Ciphers XTS-AES, XTS-Twofish, and XTS-RC6 are used during the experiments; however, the main focus is given to XTS-AES because it is developed specifically for storage encryption. Parallel encryption experiments are conducted on a mobile device, and performance comparisons are presented. The parallel XTS-AES has shown a maximum performance speedup of 1.71, with 86% efficiency, faster than the serial counterpart, with higher encryption throughput in the device up to 8290 and 11 380 KB/s when using XTS-AES and XTS-RC6 ciphers, respectively. In addition, we performed comparison between mobile device and desktop machine using similar experimental setup. It shows that the performance of storage encryption in mobile devices still lags by more than 10 folds when compared with desktop environment. Copyright © 2017 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
42. Impacts of stratum dip angle on CO2 geological storage amount and security.
- Author
-
Wang, Fugang, Jing, Jing, Xu, Tianfu, Yang, Yanlin, and Jin, Guangrong
- Subjects
GEOLOGICAL carbon sequestration ,DIAGENESIS ,STRUCTURAL geology ,POROSITY ,GAS phase reactions - Abstract
Storage strata are usually generalized as horizontal when using numerical simulation methods to analyze CO
2 geological storage in saline aquifers. However, horizontal strata are not common in nature. Most strata have gradients, because of the effects of geological structure and diagenesis. Based on the actual strata dip angle variation range of two CO2 injection demonstration projects in China, five modeling schemes were designed to investigate the impact of formation dip on CO2 storage amount and space migration of gas-phase CO2 in reservoir formation. The results show that the total CO2 storage amount is inversely proportional to formation dip, and after injection is halted, storage amounts of upper and lower parts of the same stratum reservoir have a reverse trend. Formation dip has a significant impact on the migration of CO2 . The greater the formation dip, the more significant the effect on CO2 migration distance. Given the low porosity and permeability of the Shiqianfeng formation reservoir in the case study, when the stratum dip angle is 16°, at centennial time scale, CO2 migration distance is 47.06% greater than that in the horizontal reservoir. We expect that for storage reservoirs with high porosity and permeability, the influence of formation dip on CO2 migration will be more significant. Because non-horizontal strata are predominant in deep saline aquifers in nature, regardless of the influence of formation dip, CO2 leakage risks in geological storage will be greatly underestimated. Therefore, in research related to CO2 geological storage, the stratum dip angle must be considered. © 2016 Society of Chemical Industry and John Wiley & Sons, Ltd [ABSTRACT FROM AUTHOR]- Published
- 2016
- Full Text
- View/download PDF
43. Fusion: coalesced confidential storage and communication framework for the IoT.
- Author
-
Bagci, Ibrahim Ethem, Raza, Shahid, Roedig, Utz, and Voigt, Thiemo
- Subjects
INTERNET of things ,DATA fusion (Statistics) ,INTERNET security ,TELECOMMUNICATION links ,CONFIDENTIAL communications - Abstract
Comprehensive security mechanisms are required for a successful implementation of the Internet of Things (IoT). Existing solutions focus mainly on securing the communication links between Internet hosts and IoT devices. However, as most IoT devices nowadays provide vast amounts of flash storage space, it is as well required to consider storage security within a comprehensive security framework. Instead of developing independent security solutions for storage and communication, we propose Fusion, a framework that provides coalesced confidential storage and communication. Fusion uses existing secure communication protocols for the IoT such as Internet protocol security (IPsec) and datagram transport layer security (DTLS) and re-uses the defined communication security mechanisms within the storage component. Thus, trusted mechanisms developed for communication security are extended into the storage space. Notably, this mechanism allows us to transmit requested data directly from the file system without decrypting read data blocks and then re-encrypting these for transmission. Thus, Fusion provides benefits in terms of processing speed and energy efficiency, which are important aspects for resource-constrained IoT devices. This paper describes the Fusion architecture and its instantiation for IPsec-based and DTLS-based systems. We describe Fusion's implementation and evaluate its storage overheads, communication performance, and energy consumption. Copyright © 2015 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
44. Storage Security
- Author
-
Voruganti, Kaladhar, LIU, LING, editor, and ÖZSU, M. TAMER, editor
- Published
- 2009
- Full Text
- View/download PDF
45. RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment
- Author
-
S. Senthil Kumar, B. Dhiyanesh, S. Sakthivel, and R. Radha
- Subjects
Service (business) ,Distributed Computing Environment ,General Computer Science ,Computer science ,business.industry ,Denial-of-service attack ,Cloud computing ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Computer security ,computer.software_genre ,DDoS mitigation ,Storage security ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0210 nano-technology ,business ,Cloud storage ,computer ,Edge computing - Abstract
Security is an important to process our data in public network. Most of the have the problem of distributed denial of service attacks, the cloud also a witness of facing distributed denial of service attack. The malicious user generates the malicious request to the service provided towards spoiling the performance of the cloud environment. The throughput of any cloud service is upon successful completion of service invocation. If the malicious user initiates the service if is their service without completing, it would be considered as a distributed denial of service attack. Even though there exists the number of trust verification measures enforced like TPA (third-party auditor) in the cloud environment, there is no sufficient improvement for the performance of the cloud. We propose a sequence integrity data algorithm (SIDA) to perform continuous workload scheduling for various attributes with addition privacy identifies forming (PIF-SIDA) algorithm is to enhance the data are split based on domain and stored in cloud storage. From this, the data are shown based on the domain in which the user searches these are implemented the current research trends, and to help stakeholders in the industry the developing field of edge computing. Verifying the identity of the user is not enough to safeguard the service performance. Distributed environment depends the storage security system by verifying the authenticity and auditing to improve the security.
- Published
- 2020
46. RANCANG BANGUN SISTEM PENGUNCI LOKER OTOMATIS DENGAN KENDALI AKSES MENGGUNAKAN RFID DAN SIM 800L
- Author
-
I Komang
- Subjects
Computer science ,Storage security ,Computer security ,computer.software_genre ,computer - Abstract
A storage box / locker is a facility used by people to store goods. Storage boxes are often found in buildings both in offices and in schools and other public places. Usually the existing storage box in a building still uses conventional keys. If using a conventional key security of goods in the box is still not guaranteed, but if you use an automatic item storage security system using RFID and Sim 800L, then the goods stored in the box will be guaranteed security and more efficient in its use.
- Published
- 2020
47. Auto encryption algorithm for uploading data on cloud storage
- Author
-
Mohd Tajammul and Rafat Parveen
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Applied Mathematics ,Computation ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Encryption ,Computer Science Applications ,Upload ,Computational Theory and Mathematics ,Artificial Intelligence ,Scalability ,Storage security ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Cloud storage ,Information Systems ,Computer network - Abstract
Cloud computing is a scalable, reliable, and fast growing technology. It offers a no. of services to the users on pay per use basis. These services includes: computation, storage, and various types of applications etc. It is spread all over the world with its global and robust infrastructure. This paper focuses on storage security of cloud computing. It has been found in past few years that cloud storage is not fully secured. It is in its early stage in terms of security and privacy of users’ data. Various algorithms have been designed and implemented so far, all of them seek to user for creating and entering key to encrypt data rather than generating key their self. This research paper proposed an algorithm which will produce key itself on the basis of data input and subsequently encrypt data on the basis of key produced. Encrypted data will be uploaded on cloud storage while key is kept secure at local server for future use to decrypt the data.
- Published
- 2020
48. Cryptography: A Quantitative Analysis of the Effectiveness of Various Password Storage Techniques
- Author
-
Sandip Patra and Rohan Patra
- Subjects
Password ,Dictionary attack ,Computer science ,business.industry ,Salt (cryptography) ,Hash function ,Cryptography ,General Medicine ,General Chemistry ,Computer security ,computer.software_genre ,Password strength ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Rainbow table ,Storage security ,business ,computer - Abstract
Recently, there has been a rise in impactful data breaches releasing billions of people’s online accounts and financial data into the public domain. The result is an increased importance of effective cybersecurity measures, especially regarding the storage of user passwords. Strong password storage security means that an actor cannot use the passwords in vectors such as credential-stuffing attacks despite having access to breached data. It will also limit user exposure to threats such as unauthorized account charges or account takeovers. This research evaluates the effectiveness of different password storage techniques. The storage techniques to be tested are: BCRYPT Hashing, SHA-256 Hashing, SHA-256 with Salt, and SHA-256 with MD5 Chaining. Following the National Institute of Standards and Technology (NIST) guidelines on password strength, both a weak and robust password will be passed through the stated techniques. Reversal of each of the results will be attempted using Rainbow Tables and dictionary attacks. The study results show that pairing a strong password that has not been exposed in a data breach with the BCRYPT hashing algorithm results in the most robust password security. However, SHA-256 hashing with a salt results in a very similar level of security while maintaining better performance. While plain SHA-256 hashing or chaining multiple hashing algorithms together is theoretically as secure, in practice, they are easily susceptible to simple attacks and thus should not be used in a production environment. Requiring strong password which have not been exposed in previous data breaches was also found to greatly increase security.
- Published
- 2021
49. A Study of Key Management for Encrypted Storage in Storage Area Network
- Author
-
Hai Xin LU
- Subjects
Storage Security ,Key Management ,Storage Area Network ,Electronic computers. Computer science ,QA75.5-76.95 ,Economic theory. Demography ,HB1-3840 ,Economics as a science ,HB71-74 - Abstract
As secure storage becomes more pervasive throughout the enterprise,the focus quickly moves from implementing encrypting storage devices toestablishing effective and secure key management policies. Without the properkey generation, distribution, storage, and recovery, valuable data will beeventually compromised [9]. Although a considerable amount of research hasbeen dedicated to encryption algorithms in the past decades, key managementbecomes an issue due to the quantity of data. For example, with millions of datayou will need million set of keys. To manage and keep track of these keys,complexity and operational inefficiency becomes an issue. How to manage keysbecomes a challenging task. Adequate understanding of these new challenges isessential to effectively devise new key management policies and mechanisms toguard against them. We discuss many of these methods in this new context tofill this gap
- Published
- 2009
50. The impact of heterogeneous mixed siliciclastic–carbonate systems on CO 2 geological storage
- Author
-
Azadeh Pourmalek, Adrian M. Wood, Andrew J. Newell, and Seyed M. Shariatipour
- Subjects
Outcrop ,Geology ,Petroleum reservoir ,chemistry.chemical_compound ,Fuel Technology ,chemistry ,Geochemistry and Petrology ,Clastic rock ,Storage security ,Facies ,Earth and Planetary Sciences (miscellaneous) ,Carbonate ,Economic Geology ,Siliciclastic ,Petrology ,Relative permeability - Abstract
Three different outcrops are selected in this study, each representing a shallow-marine system with varying heterogeneity provided by siliciclastic–carbonate mixing that may form a small or large stratigraphic trap. The impact of these styles of mixed facies on CO2 storage is relatively poorly known. This study demonstrates the significance of these systems for safe CO2 geological storage, as stratigraphic traps are likely to be a significant feature of many future storage sites. The three 3D models are based on: (1) the Grayburg Formation (USA), which displays spatial permeability linked to variations in the mixture of siliciclastic–carbonate sediments; (2) the Lorca Basin outcrop (Spain), which demonstrates the interfingering of clastic and carbonate facies; and (3) the Bridport Sand Formation outcrop (UK), which is an example of a layered reservoir and has thin carbonate-cemented horizons. This study demonstrates that facies interplay and associated sediment heterogeneity have a varying effect on fluid flow, storage capacity and security. In the Grayburg Formation, storage security and capacity are not controlled by heterogeneity alone but are influenced mainly by the permeability of each facies (i.e. permeability contrast), the degree of heterogeneity and the relative permeability characteristic of the system. In the case of the Lorca Basin, heterogeneity through interfingering of the carbonate and clastic facies improved the storage security regardless of their permeability. For the Bridport Sand Formation, the existence of extended sheets of cemented carbonate contributed to storage security but not storage capacity, which depends on the continuity of the sheets. These mixed systems especially minimize the large buoyancy forces that act on the top seal and reduce the reliance of the storage security on the overlying cap rock. They also increase the contact area between the injected CO2 and brine, thereby promoting the CO2 dissolution processes. Overall, reservoir systems with mixed carbonate–siliciclastic facies contribute to improving the safe and effective storage of CO2. Thematic collection: This article is part of the Geoscience for CO2 storage collection available at: https://www.lyellcollection.org/cc/geoscience-for-co2-storage
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.